|Publication number||US6314518 B1|
|Application number||US 09/140,814|
|Publication date||Nov 6, 2001|
|Filing date||Aug 26, 1998|
|Priority date||Aug 26, 1997|
|Also published as||DE69830784D1, DE69830784T2, EP0934656A2, EP0934656B1, WO1999011064A2, WO1999011064A3|
|Publication number||09140814, 140814, US 6314518 B1, US 6314518B1, US-B1-6314518, US6314518 B1, US6314518B1|
|Inventors||Johan P. M. G. Linnartz|
|Original Assignee||U.S. Philips Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (8), Referenced by (124), Classifications (37), Legal Events (5)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The invention relates to an arrangement for receiving via a transfer signal encoded content information and supplemental information, which content information comprises a watermark at least partly representing the supplemental information, the arrangement comprising a receiver device for receiving the transfer signal, a detector for detecting watermark information in dependence on the watermark, and a decoder coupled to an output of the receiver device for decoding the content information, which receiver device comprises control means for controlling the reproduction of the content information in dependence on the supplemental information.
Such a transfer system is known from WO 97/13248, document D1 in the list of related documents. In the transfer system information is transferred from the transmitter via a transfer signal to a receiver device, e.g. from a video producer via an optical disc to a disc drive for playback. The document describes that video and audio content is increasingly transmitted and recorded in a digitally encoded form, for example, an MPEG bitstream. There is a growing need to transfer supplemental information logically related to the content information, which supplemental information is intended for controlling the reproduction of the content information. The supplemental information may comprise information on the rights of the owner or originator of the content information. For example a marker is to be accommodated in such an encoded signal so as to classify the encoded signal as authentic program material. Marking digital signals is particularly useful in copy protection applications, wherein the supplemental information indicates the copyright status. Therefore the supplemental information should be protected against manipulation. The mark, also referred to as watermark, can effectively take the form of a multi-bit watermark pattern representing some supplemental information, e.g. indicating that the encoded signal constitutes copy protected content. In a digital video system, e.g. based on the digital videodisc (DVD), copy control can be based on detection of electronic watermarking. Watermarks are minor, imperceptible modifications to the video, which can be detected electronically. Such watermarks can be resistant to typical signal processing, including format conversions (e.g. PAL to NTSC), and can be detected to retrieve copyright information about the video. Watermarks are used for playback control. The basic idea of playback control is that any drive refuses to pass video content if that content contains a watermark that classifies the video as being no-copy while that video is found on a recordable medium. Hence playback control requires detection of the watermark within the drive, and a detector should be on the same chip as the drive control electronics or on the same circuit board in the drive. Noise-like, pixel-domain watermarks are not suitable for detection by a detector in the receiver device, because the complexity of the detector has to remain below a few thousand gates, as drives and DVD RAM recorders are designed as simple storage devices without any ‘intelligence’ to interpret data. Watermark detection would imply that such devices have process the content data, e.g. to demultiplex and interpret MPEG video streams, at least including run-length Huffman decoding of DCT coefficients. Hence a requirement of simplicity of playback control can not effectively be met by pixel-domain watermarks. So the known system has the problem, that the drive must be provided with a complex watermark detector.
It is an object of the invention to provide a more flexible system for controlling the playback of content information in dependence of supplemental information. For this purpose, the system according to the invention is characterized in that the arrangement comprises a decoder device comprising the decoder and the detector, which decoder device is arranged separately from the receiver device, and in that the receiver device and the decoder device comprise linking means for communicating the watermark information between the detector and the control means. This has the effect, that the complex content information decoder, which is present in a reproduction device, is used to perform the detection of the watermark, and communicates the result back to the receiving device. The receiving device controls the output signal in dependence of the communicated results. This has the advantage, that a high quality watermark, embedded within the encoded content signal, can be detected with very low additional complexity of the receiving and decoding arrangement.
According to a first aspect of the invention a receiver device for use in the arrangement is characterized in that the linking means are arranged for communicating with the decoder device for receiving the watermark information. According to a second aspect of the invention a decoder device for use in the arrangement is characterized in that the linking means are arranged for communicating with the receiver device for transmitting the watermark information. This has the advantage, that both devices can be produced separately and the total system cost is low, while a high quality watermark is used resulting in a high resistance against manipulation of the supplemental information.
An embodiment of the receiver device or the decoder device is characterized in that the linking means comprise means for securing the communication against tampering. In particular, the means for securing the communication comprise means for encryption or decryption, and/or for authentication, and/or for exchanging random numbers, and/or for providing or verifying a digital signature. This has the advantage that malicious parties are facing additional difficulties when trying to manipulate the supplemental information.
These and other aspects of the invention will be apparent from and elucidated further with reference to the embodiments described by way of example in the following description and with reference to the accompanying drawings, in which
FIG. 1 shows playback control and the basic flow of video content,
FIG. 2 shows a one-copy feature,
FIG. 3 shows the function of the copy-once ticket,
FIG. 4 shows the generation of a valid copy on a recordable carrier,
FIG. 5 shows a system with separate watermark detection, and
FIG. 6 shows a system with separate watermark detection and a secure link.
Corresponding elements in different Figures have identical reference numerals.
An important application of the invention is copy protection, the supplemental information being copy control information. A system for copy protection of recorded signals, an information carrier and reading device are known from EP-0545472 (document D2). Further relevant details about adding watermarks and control signal can be found in the related documents D3, D4 and D5. In the description below a complete copy control system is described not only including a technology for electronic pixel-domain watermarking, but also methods to resolve remaining system issues relating to the embedded signalling of copyright states. In particular, this system has been developed taking the following systems aspects into account. Casual home copying can effectively be stopped by fairly simple technical measures. Large scale pirates have ample technical means to circumvent any protection, because the number of these large operations is limited, they can be challenged in court. However, the category in between, the small-scale pirates running cottage or garage factories, may be too small to attack through legal actions. Meanwhile these pirates often have sufficient facilities for tampering with recording devices, to overcome conditional record protection measures of their own equipment. However, pirates have no access to the devices installed in the homes of their potential customers. This suggests that the best measure against small scale piracy is playback control. Playback control is regarded as an important to the strength of a copy control system. The system includes playback control because it can be conducted in a simple disc drive or other storage device which does not have facilities to process and interpret the stored “bits and bytes”. It is a technological challenge to conduct playback control in spite of the “dumbness” of such drives. A common attack on copy protection based on Record Control only is that a pirate disables the watermark checking functionality. Conditional playback avoids that discs produced by such hacked recorder can be played. This is reflected in the requirement that a watermark can be read in appropriate (digital) domains and with limited complexity. The current state of the art enables the use of electronic watermarking for copy control. Complexity of detector is a problem. Typically, detection is feasible as part of the MPEG compression or decompression algorithm. On the other hand, in order to come to a reliable copy control scheme, detection has to be performed at the (playback) drive and the recorder. A watermarking method is required that allows a copy-once feature, which is described in document D5. The copy-once mechanism included in this system is designed such that it does not provide a hook for hackers to break the strength of the entire copy control system. It should be considered as a general rule that adding extra features to the copy control system, which allow copy-once or which allow users to record their own personal creations facing minimal restrictions, should not compromise the security of the copy control concept. While the watermark detection has to be simple and computationally inexpensive, it has to withstand signal processing applied to the content. Upgrading copy-control measures has several disadvantages. Compatibility requirements limit the extent to which systems can be modified. Moreover, a scenario in which iteratively hackers break the system and the industry increases the measures is costly and ineffective. Hackers become strongly motivated by initial successes and committed to again breaking any improved systems. Starting the protection through a sufficiently strong barrier, as presented in this system, avoids that pirates can break the system at reasonable cost and easily earn profits from their activities.
FIG. 1 shows playback control in a playback system and the basic flow of video content. The video content is physically transferred to a receiver device 10, e.g. a drive reading information from a record carrier such as an optical disc 11 or a tape 12. The receiver device retrieves the information from the record carrier and the retrieved information is passed on to a detector/controller 13, which detects copy protection information. If the video content is allowed to be displayed, the encoded content signal is decoded and a video signal is passed on to a Video monitor 14, e.g. a TV. The detector/controller 13 inhibits playback, if a state ‘Never-copy’ is detected in combination with a Recordable media. Video content is watermarked with data indicating a variety of attributes. This includes copy said protection states. The copy protection states which are considered are: a) one-copy, b) no-more-copy, c) never-copy and d) free copy. In an embodiment the content contains one of two categories of watermarks, either the watermark classifies the content as status a or b or as status c. Distinction between state a and b is provided by a control ticket. The system concept is arranged for effective copy control, distinguishing the roles of DVD drives, MPEG decoders, encoders and DVD RAM encoders for (re-)encoding in the home environment. In its most basic form the player or drive tests the copyright state of the content and refuses to play content that is illegally found on media that are not original. In an embodiment the medium contains a physical mark which at least distinguishes Read Only (RO) and RAM discs. An important function of the system is to prohibit playback of state c content from non-original media. A first improvement is to cryptographically relate the physical mark to the watermark of the content as described in document D4. It is cryptographically unfeasible to compute the physical mark from the watermark content. This physical mark is embedded on the disc but cannot be read or recovered externally of the drive. During mastering of the RO disc, the bit content of the physical mark is generated from seed information provided by (and only known to) the content owner. Physical markers reserved for RO and RAM can be distinguished from one another. For a casual copier it is impossible to insert the physical mark of RO content on a recordable disc, even if he happens to know the bit content of the physical marker. It should also be recognized that small-scale piracy will be attempted, using read-only disc-pressing equipment. This is already a common method used for large and small scale pirating of audio CDs and CD ROM's. It becomes economically attractive to publish on (silver) CD RO instead of (golden) CD Recordable, if the size of the order is above about a few hundred discs. This shows that small scale piracy through RO is attractive already at small quantities. Similar attacks with DVD read-only is not adequately countered if the detector in consumer players only check for recordable and read-only media, without checking the relation between the origin of the read-only medium and its content. For a small scale pirate who wants to order a publishing house to press a certain quantity of discs, it is technically difficult to find the bit value of the physical marker. Moreover, he would have to provide the publishing house with the seed, instead of the physical marker itself. It is cryptographically unfeasible to compute the seed from the physical mark. RO Discs produced with a generic physical mark will not play content with a specific watermark that requires a particular bit combination of the physical mark.
FIG. 2 shows a one-copy feature. The record carrier 21 carries watermarked video content 22, but also carries separate control signal, e.g. a copy control ticket(s) T such as a Play Ticket 25, having a state token ‘Playback only’ 25, and/or a Copy Ticket 26 having three consecutive tokens for Playback only 27, Record 28 and Playback copy 29. One copy content is watermarked, such that it can be detected as being in state a or b. Any recorder and any player which detects such watermark, assumes that the content is in state b (no more copy) unless an explicit authorization for recording or playback is granted in the form of the cryptographic ticket T. This ticket can be stored on a legally copyable disc or included during transmission. Essentially, playback and recording of watermarked material only occurs if the appropriate authorization ticket is present. For copy-never content, the play ticket is provided as a physical mark on the disc. For the playback control as it is effectuated by a drive, the playback rules are now as follows. Playback of content is allowed if one of the following situations apply:
The content is watermarked in state c and the physical mark agrees with the watermark in the content
The content is watermarked in state a/b and the authorization mark agrees with the watermark in the content.
The content has no watermark, i.e., state d (free copy)
FIG. 3 shows the function of the copy-once ticket. A record carrier 31 is played by drive 32, which also retrieved the ticket T and removes one token illustrated by clipping action 37. The drive must pass a ‘clipped’ copy ticket 38 to its output, optionally after an MPEG decoder 33. The ticket 38 must allow a recorder 35 to copy the content (optionally after an encoder 34) and a next player to play the copied content. After these transitions, no further copies are possible. The ticket changes state during every passage of a playback and recording device. Such state modifications are cryptographically irreversible and reduce the remaining copy and play rights that are granted by the ticket. The ticket is clipped (cryptographically modified) during each playback or recorder passage. The system allows the casual consumer to make any number of first generation copies from the original. Subsequent copy is recognized such that additional serial copies would not be allowed. In this case the recording drive system would detect the “one-copy” state and modify the first state or record an additional state on the recordable media to indicate that the content is now copy protected (i.e. “no-more-copy”). Subsequent detection by the above control systems would prevent recording and allow playback.
FIG. 4 shows the generation of a valid copy on a recordable carrier. An original record carrier containing video or audio is played back in a playback system 41. A recordable media 43, such as an optical disc 44 or a tape 45, is recorded in recording drive system 42. The recording drive system 42 records only, if the ‘one-copy’ state is detected, and then also the state is modified to ‘no-more-copy’ on the recordable media. The basic record control is designed to prevent a casual consumer from copying “never-copy” and “no-more-copy” material onto a recording device. The recording device would detect the watermark and inhibit copy of the content, if ‘Never-copy’ or ‘No-more-copy’ state is detected. The modified state is passed on the recordable carrier as a new ticket T. The ticket contains multiple validation tokens. During each playback and recording step, one token is removed. Ticket T carries the information about how many generations of copies still are allowed. It indicates the number of sequential playback and recordings that can be done. For a no-copy signal, T specifies that only playback is allowed. A copy-once signal on a professionally-produced disc carries a ticket for 3 passages: playback, recording, followed by another playback. When in transit from a player to a recorder, such a signal carries a ticket for 2 passages. Since Ticket T is related to the watermark W, a ticket for a given title can not be misused to record another title. The ticket acts as a cryptographic counter that can be decremented but not incremented. The counter value is decremented by feeding the bits through a cryptographic one-way function. This implies that ticket T in the stream is replaced by T′=F(T) during each recording or playback operation, whereby F is a publicly known cryptographic one-way function. Neither the player nor the recorder pass T transparently. The system does not rely on a global secret. From a cryptographic point of view it is not necessary that F is kept secret to potential attackers.
A playback device always checks the Physical mark P on the disc. If the devices plays video, it always passes the copy control ticket through the one-way function. Playback will only take place if one of the following conditions is met: The disc contains a physical mark P reserved for professional content. The content on the disc contains a watermark W. The player further checks the validation ticket. Playback occurs if one of the following conditions is met:
The relation W = F(P) is satisfied.
T is present, and equals F(P).
The relation W = F(F(F(T))) is satisfied.
The relation W = F(P) is satisfied.
The disc contains a physical mark P reserved for recordable media. The content contains a valid W watermark used for professional recording. The validated copy-once T is present, and W=F(T). Alternatively the content is identified as a home recording of a user's personal creation (e.g. by checking watermark)
The recorder always passes the copy control ticket through the one-way function before transferring it to disc. Recording of copyrighted content is allowed only if the watermark in the stream matches W=F(F(T)). If an attacker manages to modify his recorder and record audio even if the appropriate T is not present, a normal player will reject to playback the disc.
A professional title is produced by initially generating a seed U. From this seed, the following variables are computed: P=G(U), and T=(F(F(U)) which we denote as F2(U). For a disc that the customer is allowed to copy n-times, a watermark W is created as W=F2n+1(T). The one-way function G and variable P may be specified such that P also contains an identifier for the publisher or a serial number of the mastering machine. If a pirate publisher attempts to write a particular P, in order to make a bit-exact copy of a copyright disc, that pirate must tamper with his DVD press.
The above scenario assumes watermarks to be detected with the drive and within the recorder. However, pixel-domain watermarks are not suitable for detection by most ordinary digital devices in the chain if the complexity of the detector has to remain below a few thousand gates. Drives and DVD RAM recorders are designed as simple storage devices without any ‘intelligence’ to interpret data. Watermark detection would imply that such devices have to demultiplex and interpret MPEG streams, at least to the depth of run-length/Huffman decoding of DCT coefficients. On the other hand, it appears to be critical to the strength of the copy control system that play and record control is effectuated within the drive and within the recorder, rather than ‘somewhere’ half-way the chain. These requirements (simplicity and effective location of play/record control) can not be met simultaneously by pixel-domain watermarks, but can be met by introducing MPEG “PTY” marks as described in document D1. Within the MPEG standard the parameter ‘picture type’ is abbreviated as PTY, we adopt the name PTY marking for embedded signaling that is based on intentionally modifying the PTY sequence in a video stream. The disadvantage of PTY marks is their inability to survive analogue transmission. As shown in FIG. 3, the copying may be performed by decoding the MPEG signal and encoding the video again before recorded. So the system may use the properties of several techniques (pixel domain watermarks, MPEG PTY marks and physical marks and authorization ticket). An embodiment of the system concept combines various watermarking methods. Throughout the entire chain of content transmission, pixel domain watermarks are present, but effectively these are only detectable in MPEG decoders and encoders. The pixel domain watermark plays the role of inseparable carrier of copyright attributes. The most important property of the pixel-domain watermark is that it survives not only analogue transmission but also many digital manipulations.
It is understood that the reliability of this concept depends on whether the detection of recordable media can be misled. One method is to insert fake signals into the detection circuit that distinguishes between recordable and Read-Only media. Therefor the detection needs to be performed as much upstream, i.e. close to retrieving the signals from the record carrier, as possible, in particular in the drive. This implies that also the watermark check must be conducted “upstream”. However, the inventors have seen that drives may playback without checking for watermarks if the watermark is detected separately. Preferably the watermark information is transmitted over a secure (confidentially against snooping, plus authentication and integrity) link to a compliant MPEG decoder.
FIG. 5 shows a system with separate watermark detection. A record carrier 51 carrying a physical mark P and video content watermarked with a watermark W, is played in a drive 52. The drive has information reading means 53, e.g. an optical read head, channel decoder, and an error corrector of a known type, such as for CD or DVD. The reading means also comprises a control unit which has the function to detect the physical mark P, and to control a control switch 54, which blocks the output in dependence of the copyright information. Alternatively or additionally a blocking switch or similar output enabling means can be located in the decoder unit, the output enabling means being controllable by the control unit in the drive via a forward link. The drive as shown in FIG. 5 can pass on clear content to a compliant MPEG decoder 57 via link 55, because the watermark detection takes place in the external MPEG decoder 57. The information about the presence of a watermark and possible the supplemental information carried by the watermark is transferred back to the drive via a link 56. In an embodiment the drive 52 electronically signs the content, and the compliant MPEG decoder 57 returns a watermark with appropriate signatures. The drive than checks whether the ticket is valid for content with that watermark. If the recorder and player accept to playback concept without a PTY mark, this opens several opportunities for attacks. A hacker may attempt to copy video content by offering it in uncompressed form to an MPEG encoder, which does not check for pixel-domain watermark. This stream is then offered to recorders and drives, which would pass the content. Effective copy control must therefor prohibit recording or playback of content that is free of PTY-mark, unless the drive can compare a pixel-domain watermark with a physical mark or ticket on the disc. If from a complexity point of view, the watermark detector can best be included into the MPEG decoder chip or at least on the decoder board, two options can be thought of for the location of the pixel-domain detector.
It should be anticipated that typical recording drive systems only receive bit and bytes, without side information about the contents. Recorders may accept marked content, e.g. PTY marked, if appropriate tickets are presented. Recorders may record content without checking for watermarks only if received over a (secure) link from a compliant MPEG encoder. Recorders may accept content without detecting the watermark itself, if the content plus a cleartext version of the watermark bits are signed by a compliant and authorized device (e.g. an MPEG encoder).
According to the invention the detection of the watermark is outside the drive, and takes place in a compliant decoder, e.g. an MPEG decoder. In a embodiment additional security measures are taken to further improve the copy protection, while playback control may still be effectuated in the drive. The secure system is protected against two attacks:
The attacker may replace the MPEG stream coming out of the drive by another stream, which has a free-copy status. The MPEG decoder will detect no watermark and report this to the drive.
The attacker may intercept the message from the MPEG decoder and replace it by a message that the MPEG is not watermarked (free copy)
The MPEG decoder, or a small entity (software or hardware) physically associate with the MPEG encoder, e.g. a chip on the decoder board, does the watermark detection. In the MPEG encoder substantial signal processing facilities are available, so the addition of a watermark detector usually does not excessively burden the overall complexity of the decoder.
In a first embodiment of the system, as shown in FIG. 5, no protection of the link is guaranteed by cryptography. If the drive unit is part of a PC system, an attacker may provide software algorithm to his customers that modifies signals floating over the PC bus, but customers may be less willing to accept such intervening software. Moreover these algorithms can not be place in consumer electronics (non-PC) DVD players. Thus the value of such copies are essentially reduced, and the first embodiment still provides acceptable copy protection.
FIG. 6 shows a system with separate watermark detection and a secure link. The secure link comprises a forward secure path 63 and a backward secure path 64. Like in FIG. 5 the record carrier 51 is played in a drive 52. The drive has information reading means 53, which comprise the control unit to control the control switch 54. The output is coupled to a compliant MPEG decoder 57 via forward secure path 63. The drive 52 comprises an encrypt unit 61 to encrypt the output signal from the drive using a crypto key 62, and the encrypted output signal is coupled via the forward secure path 63 to a decrypt unit 66 in the decoder 57. The decrypted output is passed on to the MPEG decoder 68, which is coupled to monitor 58 via the video output. A watermark detector 69 is coupled to the MPEG decoder 68, and any detected watermark information is encrypted in a second encryptor unit 67, and transferred via backward secure path 64 to the drive unit 52 and decrypted in decrypt unit 60, which passes the watermark information to the control unit in reading unit 53. In this second embodiment the link between drive and MPEG decoder is made secure by encryption. This implies that the drive and MPEG decoder must share a common secret. This secret can be time varying, if the two devices have a mechanism to generate a session key. This solution relies in confidentiality of the data. In its basic form, it does not protect against exactly bit-copying the data flow from drive to decoder.
In a third embodiment the drive unit and the decoder go through an authentication process first. For example, an existing encryption system like the Content Scrambling System (CSS) of the DVD could be used authenticate. Also the CSS scheme can be modified to perform the encryption and decryption functionality on the entire MPEG stream.
In a fourth embodiment the MPEG stream itself, which requires a high bit-rate is not encrypted, but the drives hashes, adds a random number and signs the MPEG stream using well known cryptographic algorithms like RSA or DSA. The MPEG decoder then verifies the signature, detects the watermark and send a message back to the drive. This message contains the retrieved watermark bits concatenated to the random number and the signature as it was placed by the drive, and MPEG decoder signs this message again. The random number avoids replay attacks, but is not absolutely necessary. Alternatively, the backward message may be encrypted, because for this message a low bit-rate is sufficient.
The above solutions have the disadvantage that cryptographic secrets need to be known by the drive and the MPEG decoder device. Moreover, encryption of the entire MPEG stream is not favorable.
In a fifth embodiment the burden of checking hashes is not placed with the drive or with the decoder, but instead is performed by the MPEG encoder. The compliant MPEG encoder already pre-computes a set of values, which it provides to the recorder and the drive.
The drives selects on of these values and uses this choice to challenge the MPEG decoder. It asks the decoder to perform the watermark check and to perform particular hash operation and to cryptographically sign the resulting numbers. This result is checked by the drive. For instance the MPEG encoder pre-computes several hash values over the MPEG content. The hash values are each computed in a slightly different manner, e.g. by concatenating a particular predetermined string mi to the content. Thus for various i (i=1, 2, N)
compute hi=Hash[MPEG stream|mi]
MPEG content plus the set of hash values are stored on the disc in encrypted form.
store ci=Encrypt[encoder key|hi]
The drive at random picks i, that is selects one of the hash functions and has values. The drive passes the MPEG but not the hash value to the MPEG decoder. The drive informs the MPEG decoder about which hash (which i) to compute. The MPEG decoder returns the watermark W, plus the appropriate hash value hi and signs this message.
store si=Encrypt[decoder key|hi]
The drive then compares decoded versions of si with cI. If the encoder and decoder keys are identical the drive can simply check whether si=ci.
In a sixth embodiment the drive unit comprises means for detecting the presence of content information on a record carrier, e.g. by detecting the structure of an MPEG encoded video signal. As soon as the content is detected a communication protocol with the MPEG decoder is started for exchanging watermark information as described above. Other content, such as computer programs, can be read from the record carrier without playback control. Alternatively all content read from the record carrier is routed to or via the MPEG decoder, and the MPEG decoder starts the protocol only if an MPEG signal is detected.
Although the invention has been explained by an embodiment using a disc as recording medium, it will be clear that other systems for transferring information can be employed in the invention. For example, the encoded signal and the control signal may be transferred via a data-network like the internet.
Whilst the invention has been described with reference to preferred embodiments thereof, it is to be understood that these are not limitative examples. Thus, various modifications may become apparent to those skilled in the art, without departing from the scope of the invention, as defined by the claims. For example, the encoded signal might be distributed on a read-only disc or tape, while the control signal might be distributed separately. Unlimited use of the control signal might be prevented by encrypting the control signal by a key known to the destination only, e.g. a key build in specific reproducing devices or a public key supplied by the destination using a public key system (e.g. RSA). Also the encoded signal and/or the control signal may additionally be protected by scrambling or encryption methods, or may be additionally provided with a digital signature. Further, the invention lies in each and every novel feature or combination of features, including those within the mentioned incorporated or related documents.
(D1) WO 97/13248-A1 (PHN 15391) Watermarking encoded signals.
(D2) EP-0545472 (PHN 13922) Closed information system with physical copy protection
(D3) WO IB98/00040 (PHN 16209) Watermarking of Bitstream- or DSD-signals (A.A.M. Bruekers et al.)
(D4) WO IB98/00085 (PHN 16210) Copy protection method for storage media
(D5) WO IB98/00087 (PHN 16372) Copy control with copy n-times feature
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5724327||Feb 14, 1995||Mar 3, 1998||U.S. Phillips Corporation||Record carrier having first variations of a first physical parameter corresponding to information recorded thereon and second variations of a second physical parameter relating to recovery of the information|
|US5905800 *||Mar 25, 1998||May 18, 1999||The Dice Company||Method and system for digital watermarking|
|US5960081 *||Jun 5, 1997||Sep 28, 1999||Cray Research, Inc.||Embedding a digital signature in a video sequence|
|US6157330 *||Jan 26, 1998||Dec 5, 2000||U.S. Philips Corporation||Embedding supplemental data in an encoded signal, such as audio / video watermarks|
|WO1997013248A1||Sep 25, 1996||Apr 10, 1997||Philips Electronics Nv||Marking a digitally encoded video and/or audio signal|
|WO1998000040A1||Jun 6, 1997||Jan 8, 1998||Swarovski & Co||Slide fastener|
|WO1998000085A1||Jun 13, 1997||Jan 8, 1998||Procter & Gamble||Absorbent article with foam absorbent structure providing improved menses acquisition and fit|
|WO1998000087A1||Jun 28, 1996||Jan 8, 1998||Hitachi Ltd||Human body assisting device|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6766102||Sep 20, 1999||Jul 20, 2004||Digimarc Corporation||Methods for reading watermarks in unknown data types, and DVD drives with such functionality|
|US6778757 *||Oct 21, 1999||Aug 17, 2004||Hitachi, Ltd.||Data recording/reproduction apparatus and method|
|US6802011 *||Jul 31, 2000||Oct 5, 2004||Sony Corporation||Copyright protection information protecting method, information signal processing method, information signal reproducing method, information signal recording method, and information signal processing device, information signal reproducing device, and information signal recording device|
|US6817535 *||Jul 8, 2003||Nov 16, 2004||Koninklijke Philips Electronics N.V.||Usage dependent ticket to protect copy-protected material|
|US6842540 *||Aug 23, 2000||Jan 11, 2005||Hitachi, Ltd.||Surveillance system|
|US6947910 *||Oct 9, 2001||Sep 20, 2005||E-Cast, Inc.||Secure ticketing|
|US7006660 *||Sep 26, 2002||Feb 28, 2006||Canon Kabushiki Kaisha||Data processing apparatus and method, data processing program, and storage medium|
|US7007165 *||Apr 7, 2000||Feb 28, 2006||Nds Limited||Watermark system|
|US7039298 *||Mar 30, 2000||May 2, 2006||Lsi Logic Corporation||Extraction of audio/visual segment from digital versatile disk content|
|US7050604 *||Oct 26, 2001||May 23, 2006||Nec Corporation||Image data protection technique|
|US7073065 *||Dec 4, 2001||Jul 4, 2006||Sony United Kingdom Limited||Watermarked material processing|
|US7116893||Apr 8, 2004||Oct 3, 2006||Hitachi, Ltd.||Data recording/reproduction apparatus and method|
|US7120251 *||Aug 18, 2000||Oct 10, 2006||Matsushita Electric Industrial Co., Ltd.||Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus|
|US7127744||Mar 7, 2001||Oct 24, 2006||Digimarc Corporation||Method and apparatus to protect media existing in an insecure format|
|US7155609 *||Jun 14, 2001||Dec 26, 2006||Microsoft Corporation||Key exchange mechanism for streaming protected media content|
|US7168091 *||Mar 15, 2004||Jan 23, 2007||Citibank, N.A.||Method and system of transaction security|
|US7177845||Dec 20, 2004||Feb 13, 2007||Microsoft Corporation||Copy detection for digitally-formatted works|
|US7200751 *||Feb 8, 2005||Apr 3, 2007||Nds Limited||Watermark system|
|US7203968 *||Sep 6, 2001||Apr 10, 2007||Sony Corporation||Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode|
|US7228293 *||Sep 16, 2004||Jun 5, 2007||Microsoft Corporation||Copy detection for digitally-formatted works|
|US7325131 *||Sep 5, 2002||Jan 29, 2008||Koninklijke Philips Electronics N.V.||Robust watermark for DSD signals|
|US7327935 *||Sep 17, 2002||Feb 5, 2008||Matsushita Electric Industrial Co., Ltd.||Information recorder, system for copying information, method for copying information, program and computer readable recording medium|
|US7343012 *||Dec 10, 2001||Mar 11, 2008||Hitachi, Ltd.||Recording and playback apparatus for stream data and transmission method for stream data|
|US7382969||Feb 19, 2003||Jun 3, 2008||Sony Corporation||Method and system for preventing the unauthorized copying of video content|
|US7424747||Apr 24, 2001||Sep 9, 2008||Microsoft Corporation||Method and system for detecting pirated content|
|US7433488 *||Jun 24, 2004||Oct 7, 2008||Sony Corporation||Information recording medium drive device, information processing apparatus, data replay control system, data replay control method, and computer program|
|US7512959||Jun 20, 2006||Mar 31, 2009||Searete Llc||Rotation responsive disk activation and deactivation mechanisms|
|US7519980||May 9, 2005||Apr 14, 2009||Searete Llc||Fluid mediated disk activation and deactivation mechanisms|
|US7526650 *||Oct 22, 2003||Apr 28, 2009||Microsoft Corporation||Personal identifiers for protecting video content|
|US7548633 *||Sep 13, 2005||Jun 16, 2009||Canon Kabushiki Kaisha||Data processing apparatus and method, data processing program, and storage medium|
|US7555201 *||Apr 11, 2006||Jun 30, 2009||Mediatek Inc.||Optical disc player system and method of controlling a decoding unit in the optical disc player system to read encoded bitstream data from a buffer memory|
|US7565596||Sep 9, 2005||Jul 21, 2009||Searete Llc||Data recovery systems|
|US7577251||Aug 30, 2006||Aug 18, 2009||Panasonic Corporation||Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus|
|US7596073||May 9, 2005||Sep 29, 2009||Searete Llc||Method and system for fluid mediated disk activation and deactivation|
|US7624199||Nov 7, 2001||Nov 24, 2009||Panasonic Corporation||Digital data distribution system with switching unit, online acquisition unit, and conversion unit for converting from first to second format|
|US7627762 *||Nov 8, 2002||Dec 1, 2009||Thomson Licensing||Signing and authentication devices and processes and corresponding products, notably for DVB/MPEG MHP digital streams|
|US7631358 *||Sep 23, 1999||Dec 8, 2009||Thomson Licensing||Copy protection method for digital data stored on a medium|
|US7636847 *||May 30, 2002||Dec 22, 2009||Sony United Kingdom Limited||Material distribution apparatus|
|US7661144 *||Sep 19, 2005||Feb 9, 2010||Lg Electronics Inc.||Apparatus and method for moving contents having a restricted number of copies between storage media|
|US7665144 *||Sep 19, 2005||Feb 16, 2010||Lg Electronics Inc.||Apparatus and method for moving contents having a restricted number of copies between storage media|
|US7665145 *||Sep 19, 2005||Feb 16, 2010||Lg Electronics Inc.||Apparatus and method for moving contents having a restricted number of copies between storage media|
|US7668068 *||Jun 9, 2005||Feb 23, 2010||Searete Llc||Rotation responsive disk activation and deactivation mechanisms|
|US7668069||Aug 5, 2005||Feb 23, 2010||Searete Llc||Limited use memory device with associated information|
|US7672568 *||Aug 7, 2003||Mar 2, 2010||Sony Corporation||Outputting apparatus, outputting method, recording apparatus, recording method, reproduction apparatus, reproduction method and recording medium|
|US7690041||Mar 30, 2010||Digimarc Corporation||Associating first and second watermarks with audio or video content|
|US7694316||Aug 14, 2006||Apr 6, 2010||The Invention Science Fund I, Llc||Fluid mediated disk activation and deactivation mechanisms|
|US7711564 *||Jun 27, 2002||May 4, 2010||Digimarc Corporation||Connected audio and other media objects|
|US7748012||Sep 9, 2005||Jun 29, 2010||Searete Llc||Method of manufacturing a limited use data storing device|
|US7751689 *||Feb 9, 2005||Jul 6, 2010||Panasonic Corporation||Stream converter|
|US7760902||May 28, 2004||Jul 20, 2010||Digimarc Corporation||Content objects with computer instructions steganographically encoded therein, and associated methods|
|US7770028||Sep 9, 2005||Aug 3, 2010||Invention Science Fund 1, Llc||Limited use data storing device|
|US7778124||Oct 2, 2007||Aug 17, 2010||Invention Science Fund 1, Llc||Method and system for fluid mediated disk activation and deactivation|
|US7796485||Dec 21, 2007||Sep 14, 2010||Invention Science Fund 1, Llc||Method and system for fluid mediated disk activation and deactivation|
|US7802100 *||Nov 10, 2006||Sep 21, 2010||Nds Limited||Watermark system|
|US7810161||Jul 2, 2008||Oct 5, 2010||Lg Electronics Inc.||Apparatus and method for moving contents after mutual authentication|
|US7818577 *||Dec 4, 2001||Oct 19, 2010||Sony United Kingdom Limited||Identifying material using a watermark and a signature|
|US7895439 *||Mar 27, 2006||Feb 22, 2011||Sony Europe Limited||Watermarked material processing|
|US7895660||Jul 2, 2008||Feb 22, 2011||Lg Electronics Inc.||Method and apparatus for moving contents using copy and movement control information|
|US7907486||Aug 22, 2008||Mar 15, 2011||The Invention Science Fund I, Llc||Rotation responsive disk activation and deactivation mechanisms|
|US7916592||Nov 29, 2007||Mar 29, 2011||The Invention Science Fund I, Llc||Fluid mediated disk activation and deactivation mechanisms|
|US7916615 *||Jun 9, 2005||Mar 29, 2011||The Invention Science Fund I, Llc||Method and system for rotational control of data storage devices|
|US7917960||Sep 15, 2009||Mar 29, 2011||Sony Corporation||Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer|
|US7954162 *||Dec 28, 2005||May 31, 2011||Sony Corporation||Transmitter, signal transfer method, data distribution system and method of same, data receiver, data provider and method of same, and data transferer|
|US8006313 *||Jan 23, 2004||Aug 23, 2011||The Math Works, Inc.||Non-machine specific optical-media based copy protection|
|US8032798||Oct 7, 2008||Oct 4, 2011||The Invention Science Fund I, Llc||Data retrieval systems|
|US8036421||Aug 17, 2010||Oct 11, 2011||Digimarc Corporation||Methods employing topical subject criteria in video processing|
|US8074285 *||Apr 22, 2009||Dec 6, 2011||Thomson Licensing||Copy protection method for digital data stored on a medium|
|US8085979||Apr 12, 2010||Dec 27, 2011||Digimarc Corporation||Methods employing stored preference data to identify video of interest to a consumer|
|US8089839||Dec 21, 2007||Jan 3, 2012||The Invention Science Fund I, Llc||Method and system for fluid mediated disk activation and deactivation|
|US8095989||Jan 10, 2012||Digimarc Corporation||Associating first and second watermarks with audio or video content|
|US8099608||Aug 3, 2006||Jan 17, 2012||The Invention Science Fund I, Llc||Limited use data storing device|
|US8121016||Aug 19, 2009||Feb 21, 2012||The Invention Science Fund I, Llc||Rotation responsive disk activation and deactivation mechanisms|
|US8122465||Jun 13, 2002||Feb 21, 2012||Digimarc Corporation||Watermarking to set video usage permissions|
|US8140745||Sep 9, 2005||Mar 20, 2012||The Invention Science Fund I, Llc||Data retrieval methods|
|US8144924||Jul 19, 2010||Mar 27, 2012||Digimarc Corporation||Content objects with computer instructions steganographically encoded therein, and associated methods|
|US8151071 *||Oct 13, 2006||Apr 3, 2012||Sony Corporation||Copy protection apparatus and method|
|US8159925||Oct 9, 2008||Apr 17, 2012||The Invention Science Fund I, Llc||Limited use memory device with associated information|
|US8181884||Aug 29, 2007||May 22, 2012||Digimarc Corporation||Machine-readable features for objects|
|US8218262||Aug 26, 2009||Jul 10, 2012||The Invention Science Fund I, Llc||Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information|
|US8219813||May 14, 2002||Jul 10, 2012||Seagate Technology Llc||System and method for protecting a peripheral device against hot plug attacks|
|US8220014||Jun 25, 2010||Jul 10, 2012||The Invention Science Fund I, Llc||Modifiable memory devices having limited expected lifetime|
|US8229159||Aug 8, 2008||Jul 24, 2012||Dolby Laboratories Licensing Corporation||Multimedia coding and decoding with additional information capability|
|US8254765 *||May 25, 2009||Aug 28, 2012||Mediatek Inc.||Optical disc player system and method of controlling a decoding unit in the optical disc player system to read encoded bitstream data from a buffer memory|
|US8264928||Apr 27, 2010||Sep 11, 2012||The Invention Science Fund I, Llc||Method and system for fluid mediated disk activation and deactivation|
|US8290202||Jan 11, 2007||Oct 16, 2012||Digimarc Corporation||Methods utilizing steganography|
|US8306393 *||Nov 29, 2007||Nov 6, 2012||Panasonic Corporation||Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium|
|US8332724||Oct 7, 2008||Dec 11, 2012||The Invention Science Fund I, Llc||Data retrieval systems|
|US8374491||May 6, 2004||Feb 12, 2013||Digimarc Corporation||Methods for reading watermarks in unknown data types, and DVD drives with such functionality|
|US8432777||Jul 1, 2010||Apr 30, 2013||The Invention Science Fund I, Llc||Method and system for fluid mediated disk activation and deactivation|
|US8457208||Dec 19, 2008||Jun 4, 2013||Dolby Laboratories Licensing Corporation||Adaptive motion estimation|
|US8462605||Aug 25, 2009||Jun 11, 2013||The Invention Science Fund I, Llc||Method of manufacturing a limited use data storing device|
|US8468274||Oct 16, 2009||Jun 18, 2013||Panasonic Corporation||Digital data distribution system with switching unit, online acquisition unit, and conversion unit for converting from first to second format|
|US8571256||Jul 19, 2012||Oct 29, 2013||Dolby Laboratories Licensing Corporation||Multimedia coding and decoding with additional information capability|
|US8745347||Dec 7, 2011||Jun 3, 2014||The Invention Science Fund I, Llc||Limited use data storing device|
|US8763144||Jan 10, 2012||Jun 24, 2014||Digimarc Corporation||Associating first and second watermarks with audio or video content|
|US8805689||Apr 11, 2008||Aug 12, 2014||The Nielsen Company (Us), Llc||Methods and apparatus to generate and use content-aware watermarks|
|US8831272 *||Oct 7, 2009||Sep 9, 2014||Koninklijke Philips N.V.||Content item identifier|
|US9042598||Jul 7, 2014||May 26, 2015||The Nielsen Company (Us), Llc||Methods and apparatus to generate and use content-aware watermarks|
|US20010037456 *||Mar 7, 2001||Nov 1, 2001||Levy Kenneth L.||Method and apparatus to protect media existing in an insecure format|
|US20020061122 *||Oct 26, 2001||May 23, 2002||Nec Corporation||Image data protection technique|
|US20020138734 *||Dec 4, 2001||Sep 26, 2002||David Morgan William Amos||Identifying material|
|US20020156743 *||Apr 24, 2001||Oct 24, 2002||Detreville John D.||Method and system for detecting pirated content|
|US20030014496 *||Jun 27, 2001||Jan 16, 2003||Spencer Donald J.||Closed-loop delivery system|
|US20040086257 *||Nov 1, 2002||May 6, 2004||Werberig David K.||Integrated machine readable media and ticket|
|US20040125125 *||Jun 23, 2003||Jul 1, 2004||Levy Kenneth L.||Embedded data windows in audio sequences and video frames|
|US20040161225 *||Feb 19, 2003||Aug 19, 2004||Dawson Thomas P.||Method and system for preventing the unauthorized copying of video content|
|US20040170276 *||Sep 17, 2002||Sep 2, 2004||Fumitomo Yamasaki||Information recorder, system for copying information, method for copying information, program and computer readable recording medium|
|US20040181669 *||Mar 15, 2004||Sep 16, 2004||Daniel Schutzer||Method and system of transaction security|
|US20040190424 *||Apr 8, 2004||Sep 30, 2004||Osamu Kawamae||Data recording/reproduction apparatus and method|
|US20040260946 *||Jun 20, 2003||Dec 23, 2004||Cahill Conor P.||User not present|
|US20040268128 *||Jun 24, 2004||Dec 30, 2004||Sony Corporation||Information recording medium drive device, information processing apparatus, data replay control system, data replay control method, and computer program|
|US20050031159 *||May 28, 2004||Feb 10, 2005||Rhoads Geoffrey B.||Content objects with computer instructions steganographically encoded therein, and associated methods|
|US20050044047 *||Sep 16, 2004||Feb 24, 2005||Microsoft Corporation||Copy detection for digitally-formatted works|
|US20050108174 *||Dec 20, 2004||May 19, 2005||Microsoft Corporation||Copy detection for digitally-formatted works|
|US20050149735 *||Feb 8, 2005||Jul 7, 2005||Nds Limited||Watermark system|
|US20050257059 *||Nov 8, 2002||Nov 17, 2005||Thomson Licensing S.A.||Signing and authentication devices and processes and corresponding products, notably for dvb/mpeg mhp digital streams|
|US20060020809 *||Sep 13, 2005||Jan 26, 2006||Canon Kabushiki Kaisha||Data processing apparatus and method, data processing program, and storage medium|
|US20080095513 *||Nov 29, 2007||Apr 24, 2008||Matsushita Electric Industrial Co., Ltd.||Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium|
|US20090232482 *||May 25, 2009||Sep 17, 2009||Shang-Tzu Ju||Optical disc player system and method of controlling a decoding unit in the optical disc player system to read encoded bitstream data from a buffer memory|
|US20110181981 *||Jan 13, 2011||Jul 28, 2011||Searete Llc, A Limited Liability Corporation Of The State Of Delaware||Method and system for rotational control of data storage devices|
|US20110200224 *||Oct 7, 2009||Aug 18, 2011||Koninklijke Philips Electronics N.V.||Content item identifier|
|WO2002099558A2 *||Nov 7, 2001||Dec 12, 2002||Inoue Mitsuhiro||Digital data distribution system|
|WO2004057580A2 *||Dec 17, 2003||Jul 8, 2004||William J Driscoll||Copy protected optical media storage device, along with methodologies for manufacturing and authenticating the same|
|WO2004075533A3 *||Feb 17, 2004||Apr 14, 2005||Sony Electronics Inc||Method and system for copy protection|
|U.S. Classification||713/176, 386/E05.004, 380/203, 713/164, 375/E07.089, 375/E07.026, 713/165, 380/201, 375/E07.001, 713/180|
|International Classification||H04N7/24, H04N5/765, G06T1/00, G11B20/00, H04N1/387, G11B20/10, H04N7/26, H04N5/913|
|Cooperative Classification||H04N19/467, H04N19/00, H04N7/24, H04N2005/91364, H04N21/23892, H04N5/913, G11B20/00086, H04N21/8358, H04N2005/91342, H04N2005/91335, H04N2005/91328, G06T1/0085|
|European Classification||H04N21/8358, H04N21/2389B, H04N7/26, H04N5/913, H04N7/24, G06T1/00W8, H04N7/26E10|
|Oct 9, 1998||AS||Assignment|
Owner name: U.S. PHILIPS CORPORATION, NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LINNARTZ, JOHAN P.M.G.;REEL/FRAME:009506/0728
Effective date: 19980915
|Apr 22, 2005||FPAY||Fee payment|
Year of fee payment: 4
|May 18, 2009||REMI||Maintenance fee reminder mailed|
|Nov 6, 2009||LAPS||Lapse for failure to pay maintenance fees|
|Dec 29, 2009||FP||Expired due to failure to pay maintenance fee|
Effective date: 20091106